You are on page 1of 3

NAME : Satria Anizam Misbakhul Akbar

Class : 2A
Number : 15/ 2041160026

RESUME TAKS IoT


VIDEO 1
What is Iot :
• Internet of Things is an ecosystem of connected physical objects that are accessible through
the internet.
Iot have are Sensor :
• Ultrasonic
• Smoke
• Human Body
• Temperatur and Humdity
• Sound
• Clock
• Laser
• Flame
• Super Regenerative
• Photosintetive
• Vibration
• Infrared
• Tilt
• Path search
• Raindrop
• Soil

Example application on IoT :


Smart home, Wearable, Smart City, Smart Grids,
Industrial internet, Connected Car,
Connectced Health, Smart Supply Chain, Smart Farming.

Challenges in Iot :
1. Scurity
2. Privacy
3. Standarts
4. Regulation
Wireless Sensor Networks
1. Active Attack :
a. Collision
b. Spoofing
c. HELLO-flooding
d. Hole Attack
e. Sybil
f. MQTT Exploit
g. Denial of Service
2. Pasuve Attack :
a. Eavesdropping
b. Node Malfunctioning
c. Node Outage
d. Traffic Analysis
Countermeasure of various Attacks
1. Active Attack :
a. Encryption Schemes
b. Authentication Schemes
c. Random key pre-distribution schemes
d. Anomaly detection-based IDS
e. Public Key Cryptography (PKC) algorithms
Edge Computing
1. Edge: Attacks and Scurity Issues :
a. Eavesdropping
b. Dos Attack
c. Data tampering attack
d. Insecure communication between devices
e. Recovery and backup data during a system outage
2. Soulution :
a. Equip all edge nodes with the same level of security as the network
b. Encryption and acces authorization of data
c. IDS
d. Lightweight cryptographic algorithm
e. UBP with Decoy Technique

Conclution
• The Iot is a large scale complex architectural design comprising a variety af heterogeneous
devices, therefore scalability, transparanency, and reability are most prominent milestone to
be archived.
• But without considering Security-related initiative these milestone can’t be achieved.

VIDEO 2
IOT SECURITY
Example of Security issues
• Door locks
• House appliances
• Medical devices
• Public utillies
SECURITY TYPES
• Security by design
• Security by obscurity
Microcontrollers and Computers
1) Local internet only
a. Simple system
b. Control Hardware
c. Low speeds
d. Small memory
e. Run single software
2) Local network and internet
a. Full CPUs
b. High speeds
c. Large memory
d. Run OS

You might also like